What We Do
   Past Events
   Register for
   an Event

   Sponsorship    Information

   In the News
   Contact Us
DC on facebookDC on Twitter
Tech-Security Conference 2013

Seattle Tech-Security Conference

Date: Thursday, January 24, 2013

Renaissance® Seattle Hotel
515 Madison Street Seattle, Washington, 98104
p: 206.583.0300

>>click here for directions


The Seattle Tech-Security Conference features 25-30 vendor exhibits and several industry experts discussing current tech-security issues such as email security, VoIP, LAN security, wireless security, USB drives security & more. There will be lots of give a ways and prizes such as iPods, $25, $50 and $100 gift cards, as well as cash prizes and lots more! This unique conference format will provide educational speaker sessions as well as tremendous networking opportunities. You'll come away with advice and knowledge you can start applying to your environment immediately. To register for this conference, click on the link in the left column. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. Scroll down to view the full conference agenda.

For information on participating as a vendor: sales@dataconnectors.com


This Conference Qualifies For
CPE Credits.

8:15am-8:45am Check-In and Opening Introductions
Data Connectors Data Connectors is proud to host the Tech-Security Strategies Conference.
8:45am-9:30am Session One

Fortinet, Inc.

Brian McLean

Taking Control of Network Security In a Web-Centric World


>click here for the presentation

9:30am-10:00am Break/Vendor Booth Time
10:00am-10:30am Session Two

Aruba Networks, Inc.

Brian White
Consulting Systems Engineer

Enabling Secure BYOD over any network

Need to embrace employee-owned tablets and smartphones at work without losing control of your users, your network and your data? Aruba can help you simplify the onboarding and management of mobile devices on your network and reduce the time and resources required to support Bring Your Own Device (BYOD) initiatives. Start now: hear about the industry’s first BYOD solution to securely provision and onboard iOS, Android, Mac OS X and Windows 7 mobile devices on any network.

10:30am-11:15am Session Three

Aerohive Networks, Inc.

Troy Roberts
Director of Sales for the West

Preparing Your Network’s Architecture for the Mobile Device and Application Explosion

Enterprises are expanding their wireless network capabilities to improve productivity, bring branch offices online inexpensively and, most important, address the diversity and explosion of smart mobile devices. Whether these mobile devices are corporate issued or personally owned, almost every IT department is experiencing unprecedented effects of the mobile device adoption in the enterprise. In this session, you’ll learn about this explosion of smart mobile devices, the problems it poses for IT, and how you can prepare your network’s architecture for BYOD in terms of scalability, service survivability, integration, application security and control, and Simpli-Fi-cation; how to do more with less.

>>click here for the presentation

11:15am-11:45am Break/Vendor Booth Time/Lunch
11:45am-12:30pm Session Four

Blue Coat Systems.

Steve Carlson

Breaking the Vicious Cycle of the Malnet Threat and Botnet Infections

The Vicious Cycle of Malnets
In 2012, Blue Coat expects malware distribution infrastructures will be responsible for more than two- thirds of all malicious cyber-attacks.  Malnets (malware networks) are extensive infrastructures embedded in the Internet and designed to deliver mass market attacks to the largest possible audience on a continuous basis. Hear the details of Blue Coat Systems latest 2012 Security Report and learn why stopping the attacks using traditional zero-day defenses is a losing proposition.  Learn how cyber-criminals have created a vicious cycle of malware attacks and why you need new solutions in order to protect your users and break this vicious cycle.  In this session you learn:

  • What threat vectors are being exploited by cyber-criminals to target their attacks
  • Why the 'whack-a-mole' defense strategy just doesn't work against todays attacks
  • Why 'zero-day' defense is insufficient and why you need negative-day protection
  • Where malnet infrastructures are located and hide and why they are nearly impossible to eradicate

>>click here for the presentation

12:30pm-12:45pm Break/Vendor Booth Time
12:45pm-1:15pm Session Five

Varonis Systems

Scott Truchot
Senior Regional Consulting Engineer

Bring Your Own Service - The Effects of Cloud Services on Compliance and Data Protection

Scott Truchot brings over 14 years of technology industry experience to his role as Senior Regional Consulting Engineer at Varonis Systems, a software company specializing in Data Governance.    As a former Director of IT, Scott struggled with the overwhelming manual process involved with enforcing authentication, authorization and accountability controls.  Since joining Varonis in 2007, Scott has helped many companies design, build and maintain flexible, robust and secure information technology systems.

>>click here for the presentation

1:15pm-1:45pm Session Six



1:45pm-2:15pm Session Seven


Ben Rogers
Systems Engineering Manager

Secure Cloud and BYOD Strategies: Managing Trust and Encryption

Using the cloud and allowing for BYOD means losing some control. Digital certificates, SSH authentication and encryption keys restore control, right? Unfortunately, these security mechanisms—which have become foundational in every enterprise for establishing trust and connectivity—have become ticking time bombs in many cloud and mobility initiatives. Simple errors and malicious attacks have turned these assets into operational, compliance and security liabilities.  Learn how to identify these risks and build best-practice cloud and BYOD architectures to keep your enterprise safe.

>>click here for presentation

2:15pm-2:30pm Break/Vendor Booth Time
2:30pm-3:15pm Session Eight

WatchGuard Technologies, Inc.

Peter McNaull

BYOD: Bring Your Own Device or Bring Your Own Danger?

Understanding the benefits and the risks


>>click here for the presentation

  Prize Drawings For All In Attendance
3:15pm-4:00pm Session Nine

Centrify Corporation

Steven Hansen
Systems Engineer

Unifying Identity Services Across Data Center, Cloud and Mobile

Find out how Unified Identity Services can integrate authentication, access control, privilege management, policy enforcement and user-level auditing across servers, applications and mobile devices. Discover how Active Directory can be leveraged to centrally manage on–premise and cloud–based systems and applications; mobile devices and mobile apps. Learn about the importance of consolidating “islands” of identity and enforcing granular privilege management to improve security and compliance and reduce operational costs.

>>click here for the presentation

4:00pm-4:45pm Session Ten
Hitachi ID Systems  
  Prize Drawings For All In Attendance

Event Sponsors/Exhibitors

A10 Networks, Inc.
Aerohive Networks, Inc.
Aruba Networks, Inc.
BeyondTrust Software, Inc.
Blue Coat Systems.
BrightPlanIT Inc.`
Centrify Corporation
Cenzic, Inc.
cPacket Networks
F5 Networks, Inc.
Fortinet, Inc.
Hitachi ID Systems
Infoblox Inc.
Interwork Technologies Inc.
Invincea, Inc.
KEMP Technologies, Inc.
Meru Networks
NetClarity, Inc.
Network Computing Architects Inc.
paloalto Networks
SAINT Corporation
Silver Peak Systems, Inc.
Tripwire, Inc.
Varonis Systems
Voltage Security, Inc.
WatchGuard Technologies, Inc.
Wave Systems Corp.
   Copyright © 2009-2014. Data Connectors, LLC. All rights reserved. Send comments to webmaster@dataconnectors.com
Data Connectors Privacy Policy